This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

FBI’s N-DEx System Helps Unearth Credit Card Fraud Ring

An intelligence analyst used the N-DEx system to discover a 16-member gang cheating liquor and cigarette stores across eight states.

An intelligence analyst (IA) with the New York State Intelligence Center has uncovered a major 16-member credit card fraud ring responsible for 32 incidents in eight US states. She was able to find the gang with the help of the FBI's National Data Exchange (N-DEx) System, says a release on the agency’s website.

In early 2015, the IA was responding to an "Attempt to Identify" alert from Virginia pertaining to an incident in which two people were found using cloned credit cards at a liquor store. The IA could identify one and dug up the N-DEx System for information on the other. This led her to find data that linked one incident to another until she eventually unearthed an extensive credit card fraud scheme originating from Far Rockaway, New York, targeting liquor and cigarette stores.

The IA was able to put together detailed information in a 22-page dossier that benefited 21 law enforcement agencies all over the country.

"I developed this case [almost] exclusively with N-DEx, and without the system, this case would not have been nearly as successful," she says.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes...